INFLUENCE OF SECURITY COMPLIANCE DEMANDS AND RESOURCES ON SECURITY COMPLIANCE-AN EXPLORATORY STUDY IN VIETNAM
|
|
|
- Denis Gallagher
- 10 years ago
- Views:
Transcription
1 INFLUENCE OF SECURITY COMPLIANCE DEMANDS AND RESOURCES ON SECURITY COMPLIANCE-AN EXPLORATORY STUDY IN VIETNAM Cong Hiep Pham, School of Business Information Technology and Logistics, RMIT University Vietnam, Vietnam, Jamal El-den, Charles Darwin University, Darwin, Australia, Joan Richardson, School of Business Information Technology and Logistics, RMIT University, Melbourne, Australia, Abstract This study extends current information security compliance research by adapting work-stress model of the Job Demands-Resources (JD-R) model to explore how security compliance demands and security resources influence the system users information security compliance. The paper proposes that security compliance burnout and security engagement as the mediating factors between security compliance demands, security resources and individual security compliance. We employed a multi-case study method to explore the characteristics of security compliance demands and security resources that could influence security compliance. Interviews with system users in three organisations in Vietnam revealed three types of security compliance and four types of security resources that may influence security compliance burnout and engagement respectively. Practical implications of the initial findings are also presented. Keywords: Security compliance, Compliance burnout, Security engagement, Security demands, Security resources.
2 1 INTRODUCTION The term information security refers to protecting data and information systems from unauthorised access, use, disclosure, disruption, modification, or destruction in order to ensure their confidentiality, integrity and availability (US Code Title 44, Chapter 35, Subchapter III, 3542). Information security threats are major concerns for organisations that rely on networked information systems to store corporate information and to conduct essential business functions. Information security threats can be external or internal and threaten the confidentiality, integrity and availability of the organisational information and information systems. External security threats can be viruses; malwares, or professional hackers, whereas, internal security threats mostly come from employees. The employees may intentionally or unintentionally violate security procedures and may inflict severe damages to the organisations information. Organisations often implement technical security protection measures and use security policies as instructions and guidance for their employees to practice safe security practice to protect information security. Research has shown that system users are often the weakest link in IT security systems (Crossler et al. 2013). Organisations lose millions of dollars due to their employees negligence and non-compliance in information security and that 60% of IT managers of global companies reported employees misconduct as the real threats to information security (Herath and Rao 2009a). For a number of reasons, system users may ignore adhering to safe security practices as specified in the security policies, for example installing free software from the Internet, using simple passwords, or sharing computer accounts. Unsafe security practice could compromise the whole security system regardless of how sophisticated and effective technical security protection measures are. Prevention of system users security violations requires more than the traditional technical security controls. To encourage security policy compliance (i.e. reducing internal security threats), organisations often introduce security trainings and communicate potential security risks to system users. Moreover, organisations can also enforce sanctions for security violations. Security trainings and security risk communications provide system users with necessary skills and knowledge to evaluate and respond to security threats (Cox 2012, Furnell and Rajendran 2012, Vance and Siponen 2012, Vance et al. 2012). The main premise is that people with better security skills and security risk awareness would be more likely to comply with security policies; and due to fear of strict sanctions people would be less likely to violate security policies (Guo and Yuan 2012, Vance and Siponen 2012). Security compliance cost has been recognised as a key factor that reduces security compliance (Padayachee 2012, Ifinedo 2011). Employees may find security compliance time-consuming and inconvenient and obstructing their daily routine work and may not comply anymore (Furnell and Rajendran 2012, Vance and Siponen 2012, Dhillon and Torkzadeh 2006). Recent study showed that security tasks could cause stress, incease moral disengagement, and lead to security non-compliance (D'Arcy et al. 2014). D'Arcy et al. (2014) highlight the need to explore the negative impact of security requirements to security compliance. This study examines stress-based factors to security compliance, however, from a different perspective. Job Demands-Resources (JD-R) model (Demerouti et al. 2001) is a work-stress model that proposes job demands and job resources influence employees organisational commitment and performance through job burnout and job engagement respectively (Crawford et al. 2010, Demerouti et al. 2001, Dwyer and Ganster 1991, Fernet et al. 2013). Based on the JD-R model, our study suggests that security compliance demands and organisational security resources affect system users security compliance through compliance burnout and engagement. Given their limited resources, organisations need to know specific security compliance demands and resources that are most essential to increase security compliance. Equipped with that knowledge, organisations can focus their effort to develop security programs that can reduce compliance burnout and increase security compliance engagement.
3 This study aims to identify some of the security compliance demands and security resources which might affect security compliance. The study employs a qualitative approach to answer the research questions. Lack of qualitative research in security compliance has been highlighted and more insights of security compliance should be explored in actual work contexts (Crossler et al. 2013). Thus this study contributes to explore insights into security compliance behaviour and improve understanding of security compliance. The remainder of the paper is structured as follows. Firstly, literature review of current IT security compliance approaches is presented. Secondly, the JD-R model is explained as a theoretical basis to understand two motivational outcomes of security compliance under security compliance demands and organisational resources. Next, justification of the study s research methodology followed by the initial research findings, practical implications of the study model are presented. 2 CURRENT APPROACHES TO MOTIVATE SECURITY COMPLIANCE Security non-compliance can be classified as intentional or unintentional computer violations (Padayachee 2012). Intentional computer violations can be further divided into malicious or nonmalicious violations. Malicious intentional violations involve a premeditated intention to harm the company s information and computer resources for revenge or commercial gains (Lee et al. 2004, Hu et al. 2011, Hovav and D Arcy 2012). Non-malicious intentional violations may involve unsafe IT security practice to save time for personal convenience (Vance and Siponen 2012). Unintentional violations occur could be due to lack of security awareness or knowledge of security policies implemented in the company. For example, an employee may install a freeware on an office computer without realising that the freeware could spread malware or viruses to the organisational network and its computers. Behavioural theories have been employed to understand why employees comply and/or do not comply with IT security requirements. Treating non-compliance as intentional violations, preventive theories such as General Deterrence theory introduces sanctions and rewards to deter and reduce security violations (Herath and Rao 2009a, Hovav and D Arcy 2012, Hu et al. 2011). Fear of sanctions for non-compliance and rewards for compliance have been found to have a significant impact on IT security behaviour (Herath and Rao 2009b, Kankanhalli et al. 2003). Thus communication of certainty and severity of sanctions for non-compliance could be effective in preventing employees from violating IT security policies. Motivation to comply with IT security policies can be affected by perceived fear of the security threats consequences. Fear-based theories such as Protection Motivation Theory (PMT) have been widely used to explain the impact of perceived fear of security threats on compliance. PMT explains that people are motivated to take protective actions to reduce fear as a result of conducting security threat appraisal and response appraisal (Maddux and Rogers 1983, Rogers 1975). Perceived fear of security risk consequences would motivate system users to take counter-measures to reduce such fear if only effective response measures are available and people are capable of taking them (Vance et al. 2012, Ifinedo 2011). Security compliance can also be examined from a rational cost-benefit analysis. Rational choice theory (Becker 1968) put forward two premises for the consideration of an offence: (1) balancing of both costs and benefits of the offending and (2) the decision maker s perceived expectation of reward and cost of not committing an offence. For example, a user may avoid scanning a USB to save time but need to balance with the cost of losing stored data on the device. Immediate and direct cost of security compliance has been recognised as a key factor that reduces security compliance (Padayachee 2012, Ifinedo 2011). Employees may find security compliance time-consuming and inconvenient and obstructing their daily routine work. Research has shown that when security measures hinder the employees from doing their job, they start to get around it or stop complying with security measures (Furnell and Rajendran 2012, Vance and Siponen 2012, Dhillon and Torkzadeh 2006). Furthermore, the complexity, uncertainty, and overload of security tasks were found negatively affecting security compliance (D'Arcy et al. 2014). Such nature of security tasks causes certain level
4 of stress and increase moral disengagement in the users which would then lead to non-compliance (D'Arcy et al. 2014). The current study follows the research direction of exploring security compliance cost and how it affects security compliance. The next section provides the theoretical basis of the study model. 3 SECURITY COMPLIANCE DEMANDS, RESOURCES AND SECURITY COMPLIANCE Job Demands-Resources (JD-R) model is a work stress model which explains employees job commitment and job performance can be affected by both positive (resources) and negative (demands) job characteristics via dual processes of job burnout and engagement (Bakker and Demerouti 2007). Job demands associated with both physical and psychological cost of the job have been identified as the main determinants of negative job strain (Demerouti et al. 2009), depression and psychological distress (Bruck et al. 2002). Job resources, on the other hand, are those physical, social, or organisational aspects of the job that help facilitate the fulfilment of goals, reduction of job demands associated physical and psychological costs, and promotion of personal growth and development (Demerouti et al, 2001). Job burnout is a state of mental fatigue including exhaustion and cynicism (Schaufeli and Bakker 2004) which is a direct outcome of certain job demands and can be mitigated by job resources (Demerouti et al, 2001). Whereas job engagement is a positive, fulfilling, work-related state of mind as a result of receiving adequate job resources that support the achievement of work goals or satisfaction of basic needs (Schaufeli and Taris, 2014). Job engagement can also be characterised as level of energy, involvement and efficacy one has in performing a job (Schaufeli et al. 1996). Job engagement has been found increasing job commitment, job satisfaction and individual performance. Organisations require employees to comply with IT security policies and to take cautious IT security care when dealing with organisational information resources. Security measures often add extra overhead such as compliance time and knowledge demand on the system users to comply. Security tasks and the impact of fulfilling security tasks on system users work can be considered as security compliance demands. Security compliance demands can lead to compliance burnout and reduce security compliance. In the meantime, organisational security resources such as clear security policies, security awareness trainings and regular technical support can help system users to fulfil security demands by reducing compliance burnout and increase engagement. This study proposes that system users who have to adhere to stressful security demands experience compliance burnout (H1) which then reduces their security compliance (H4). Receiving relevant organisational supporting resources to promote security compliance would reduce the compliance burnout (H2) and increase compliance engagement (H3), which then increase security compliance (H5) (see Figure 1 for the conceptual security compliance model). Figure 1: Conceptual security compliance model
5 JD-R model is an open and descriptive model which does not specify well-defined sets of job demands, resources, and organisational outcomes (Schaufeli and Taris, 2014). In particular, JD-R model does not specify what demands or resources would be the source(s) of employees stress and/or effectively reducing job demands stress as well as enhancing job engagement in a specific work environment. Though a comprehensive list of job demands and resources have been developed in Schaufeli and Taris (2014), it has little value to organisations to focus on all demands and resources to improve security compliance. Thus, the study is designed to to explore security compliance demands and resources that might influence security compliance through security compliance burnout and security engagement. 4 RESEARCH DESIGN AND METHODOLOGY This study employs a multi-case study approach to address the research problem. Case study approach is considered appropriate for studying a phenomenon in its natural settings where little or no previous research has been done (Pare 2004). Little research has been conducted to explore characteristics of security compliance demands and resources that affect security compliance; case study method is suitable for this study. Case studies can be single or multi-case design where multi-case is mainly for replication purpose, not sampling logic (Yin 2009). Multiple-case design increases the generalisability of research results by replicating the pattern matching in different cases. IT security environment of an organisation may vary in term of IT security demands and resources depending on their security risks, number of users, system complexity, and many other characteristics. This explains why in this research we adopted a multi-case design which includes participants from different organisations in different industries in order to obtain diverse representation of the research findings. Further, the study focuses on exploring impacts of IT security environment on the system users, thus only system users from different departments were invited for interviews Given the typically small sample size of qualitative studies, informative cases are essential in answering research questions and to meet research objectives (Saunders et al. 2012). In this study, it was important to choose organisations that used information technology intensively and expected the users to comply with security policies. Diversity of the participants job positions was also important to provide diverse views of their security experience. Organisations and participants for the interview were recruited through a network of friends and colleagues who recommended suitable candidates for the study. The candidate organisations were first screened to ensure they explicitly specified system users security responsibilities. Specification of security responsibilities could be formal such as written security policies, terms in labour contract or informal such as verbal instructions from IT department or supervisors. Examples of security specifications could be conditions of accessing Internet for work and non-work purposes, using portable devices at work, or attending security trainings. Security specifications were collected during the interview to rate the level of security demands in each interviewed organisation. As the main focus of the research questions are to explore the impacts of security environment on system users security compliance, only system users were invited for interviews. No specific conditions were required for the participants so as long as they were willing to spend up to 60 minutes for the interviews at the organisational premise. Interviews were undertaken with seventeen people in three organisations during a four-month period. The interviewed organisations including a local bank branch, a university, and an oil distribution firm were selected as they had different security demands and security resources which provided diverse security contexts for the study. 5 INITIAL FINDINGS Due to page numbers limit of the paper, only a summary of the results is presenten in the paper. In total, three security demands and four security resources were identified from the interview data that affected the participants' security compliance. The three security demands are the need to learn security policies, security skill demand to comply with security requirements, and security compliance overload. The four organisational security resources are organisational security response efficacies,
6 level of security compliance autonomy, opportunities to develop security skills, and individual compliance evaluation. Based on the initial findings, an updated security compliance model is proposed (Figure 2). Figure 2: Updated security compliance model The following section briefly discusses the initial findings of the study. Question 1: What security demands affect security compliance? The interview data revealed that not all participants experienced security compliance burnout from routine security demands at work. Especially participants from the bank branch even though they had to comply with much stricter security demands. Most participants considered security tasks demands as simple and easy to comply with. However, compliance burnout would increase sharply when the participants had to comply with more complex security tasks such as reading security policies for instructions, acquiring specific knowledge of emergent security risks (e.g. spoofing websites) or to assess unfamiliar security risks, or complying with security tasks which interfere with their main jobs. Most participants emphasised that the organisation should communicate security policies in a fun, simple, and easy to comprehend. The current written format of the security policies really discouraged them from being more active compliance. On the exception of the IT lecturer, all other participants reported little or no IT knowledge which might help them to understand the contents of the security policies and stated that it was too much additional work to adhere to all security requirements in their work. Compliance burnout would also increase when the participants are not well informed and clear about the purpose of the security measures implemented. Interview data shows that if system users experience overloading or counterproductive security measures and become cynical toward overall organisational security effort they would avoid or delay complying with security tasks. It is interesting to notice that having experienced less compliance burnout does not always lead to higher compliance. People may not experience burnout simply because they do not have to be involved with security tasks or delegate security tasks to the organisation. Active involvement of the users is required and the security risk levels need to be communicated regularly to remind of the need to be aware of the risks and that the users can play an important role to protect organisational security.
7 Question 2: What organisational resources affect security compliance? Based on the interview findings, organisational security resources including organisational security response efficacies, opportunities to develop skills, compliance autonomy, and personal compliance evaluation (i.e. rewards and sanctions) are found to affect security compliance. Firstly, the participants expected that the organisation must demonstrate competences of providing security tools and support system users in their daily work. It is then the participants would take part in the security program. Secondly, good security compliance means security competency and that security skills should be treated as a necessary work attribute. This would result in compliance diligence without experiencing compliance burnout. Thirdly, due to the nature of security controls, users often have little control in what to do with security and increase their frustration, especially when adherence of security controls affects work productivity. If security policies that are not built to accommodate for system users prior security expertise could frustrate them as they cannot use their skills that could further discourage system users from active compliance. Organisation should allow appropriate security compliance autonomy that can encourage system users to be more responsible as they can use their skills. Lastly, most participants treated security compliance tasks as additional and unnecessary and should be minimised. However, some participants expressed that they would be more willing to enhance their security skills and pay attention to security if personal compliance evaluation was implemented. For example, security skills and active compliance should be recognised, rewarded or poor compliance should be penalised. Though little evidence of compliance engagement was found among the participants, the highly engaged participants often have prior security knowledge, have good knowledge of security requirements and satisfied with security infrastructure of the organisation. These participants viewed organisational well-being as theirs and protecting security was contributing to the organisational wellbeing in which each employee could play a significant role. 6 PRACTICAL IMPLICATIONS From a managerial perspective, this study provided a starting point to organisations to reconsider current IT security programs. Understanding that compliance burnout caused by complying with security demands and active security engagement from receiving effective security resources can be the first step towards establishing an effective information security program. First, it is important that organisations should introduce security compliance tasks in a new way that delivers simple, fun, interactive security instructions. Traditional method of developing written security policies needs to be reconsidered its effectiveness in promoting security compliance.. Second, security systems should be carefully reviewed to minimise impact on employees work productivity and automate routine security tasks to reduce user involvement. Third, organisations should not rely on staff to spend extra effort in understanding and responding to standard security warnings. Instead risk information should be presented in illustrative and interactive formats where the users can easily assess the severity and relevance of the risks through visual analysis. Forth, organisations need to provide timely, responsive and effective technical security support.. Strict security controls may have counter-effect to security compliance as the users could become totally reliant and delegating to the IT department for security protection. Organisations should consider customising security controls for different groups of users to satisfy work needs and facilitates the ability to utilise and develop their skills. Last but not least, organisations should establish security compliance evaluation schemes that assess and recognise different levels of security compliance. Tangible or intangible rewards can be applied to recognise individual security effort or sanctions to deter serious non-compliance. Though it is recommended that security compliance should not simply be promoted on an individual basis but to foster an organisation-wide culture which could have significant impact to individuals compliance (Lacey 2010, Parsons et al. 2010).
8 7 CONCLUSION The paper proposes a stress-based security compliance model that proposes system users may experience security compliance burnout from complying with security demands and engage with security activities as a result of receiving security resources. Compliance burnout and security engagement then affect the security compliance of the system users. Initial in-depth interviews with 17 users from three organisations identified three security demands and four organisationsal security resources that were considered important to encourage security compliance. Besides, the participants were found to expericence some levels of compliance burnout and security engagement in exercising security compliance at work. Our initial findings establish a basis for further study to quantitatively examine the proposed stressbased security compliance model. The extent that security demands and security resources identified in this study affect security compliance should be assessed to strenghthen the initial model. This study also highlights the need to assess the burnout and engagement level in current security compliance programs. References Bakker, A. B. & Demerouti, E. (2007). The Job Demands-Resources model: state of the art. Journal of Managerial Psychology, 22, Becker, G. S. (1968). Crime and punishment: an economic approach. Journal of Political Economy, 76. Bruck, C. S., Allen, T. D. & Spector, P. E. (2002). The relation between work-family conflict and job satisfaction: a finer-grained analysis. Journal of Vocational Behavior, 60, Cox, J. (2012). Information systems user security: A structured model of the knowing doing gap. Computers in Human Behavior, 28, Crawford, E. R., Lepine, J. A. & Rich, B. L. (2010). Linking job demands and resources to employee engagement and burnout: A theoretical extension and meta-analytic test. Journal of Applied Psychology, 95, Crossler, R. E., Johnston, A. C., Lowry, P. B., Hud, Q., Warkentin, M. & Baskerville, R. (2013). Future directions for behavioral information security research. Computer & Security, 32, D'arcy, J., Herath, T. & Shoss, M. K. (2014). Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems, 31, Demerouti, E., Bakker, A. B., Nachreiner, F. & Schaufeli, W. B. (2001). The job demands-resources model of burnout. Journal of Applied Psychology, 86, Demerouti, E., Le Blanc, P. M., Bakker, A. B., Schaufeli, W. B. & Hox, J. (2009). Present but sick: a three-wave study on job demands, presenteeism and burnout. Career Development International, 14, Dhillon, G. & Torkzadeh, G. (2006). Value-focused assessment of information system security in organizations. Information Systems, 16, Dwyer, D. J. & Ganster, D. C. (1991). The effects of job demands and control on employee attendance and satisfaction. JOURNAL OF ORGANIZATIONAL BEHAVIOR, 12, Fernet, C., Austin, S. P., Tre Panier, S.-G. V. & Dussault, M. (2013). How do job characteristics contribute to burnout? Exploring the distinct mediating roles of perceived autonomy, competence, and relatedness. European Journal of Work and Organizational Psychology, 22, Furnell, S. & Rajendran, A. (2012). Understanding the influences on information security behaviour. Computer Fraud & Security. Guo, K. H. & Yuan, Y. (2012). The effects of multilevel sanctions on information security violations: A mediating model. Information & Management, 49, Herath, T. & Rao, H. (2009a). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18,
9 Herath, T. & Rao, H. R. (2009b). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47, Hovav, A. & D arcy, J. (2012). Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea. Information & Management, 49, Hu, Q., Xu, Z. C., Dinev, T. & Ling, H. (2011). Does Deterrence Work in Reducing information security Policy Abuse by employees? Communications of the ACM, 54, Ifinedo, P. (2011). Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31, Kankanhalli, A., Teo, H.-H., Tan, B. C. Y. & Wei, K.-K. (2003). An integrative study of information systems security effectiveness. International Journal of Information Management, 23, Lacey, D. (2010). Understanding and transforming organizational security culture. Information Management & Computer Security, 18, Lee, S. M., Lee, S.-G. & Yoo, S. (2004). An integrative model of computer abuse based on social control and general deterrence theories. Information & Management, 41, Maddux, J. E. & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19, Padayachee, K. (2012). Taxonomy of compliant information security behavior. Computer & Security, 31, Pare, G. (2004). Investigating information systems with positivist case study research. Communications of the AIS, 13, Parsons, K., Mccormac, A., Butavicius, M. & Ferguson, L. (2010). Human Factors and Information Security: Individual, Culture and Security Environment. In: Defence, A. D. O. (ed.). Command, Control, Communications and Intelligence Division DSTO Defence Science and Technology Organisation. Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91, Saunders, M., Lewis, P. & Thornhill, A. (2012). Research methods for business students, Pearson Education. Schaufeli, W. B. & Bakker, A. B. (2004). Job demands, job resources, and their relationship with burnout and engagement: a multi-sample study. Journal of Orgnizational Behavior, 25, Schaufeli, W. B., Leiter, M. P., Maslach, C. & Jackson, S. E Maslach Burnout Inventory- General Survey. In: Maslach, C., Jackson, S. E. & Leiter, M. P. (eds.) The Maslach Burnout Inventory: Test manual. 3rd ed. Palo Alto, CA: Consulting Psychologists Press. Schaufeli, W. B. & Taris, T. W A critical review of job demands-resources model: Implications for improving work and health. In: Bauer, G. F. & Hammig, O. (eds.) Bridging Occupational, Organizational and Public Health: A Transdisciplinary Approach. Dordrecht: Springer Science+Business. Vance, A. & Siponen, M. (2012). IS Security policy violations: A Rational choice perspective. Journal of Organizational and End User Computing, 24, Vance, A., Siponen, M. & Pahnila, S. (2012). Motivating IS security compliance: Insights from Habit and Protection Motivation Theory. Information & Management, 49, Yin, R. K. (2009). Case study research: Design and Methods, Thousand Oaks, CA: Sage.
Maximising the Effectiveness of Information Security Awareness
Maximising the Effectiveness of Information Security Awareness This thesis offers a fresh look at information security awareness using research from marketing and psychology. By Geordie Stewart and John
Industrial and organisational psychology
Chapter Industrial and organisational psychology Michael P O'Driscoll and Paul J Taylor Psychology Department University of Waikato New Zealand Introduction Industrial and organisational (I/0) psychology
WEEK SIX Performance Management
WEEK SIX Performance Management Performance Management: objective-setting and systematic performance review Monitoring Performance: control/monitoring systems, absence control and the design of disciplinary
Task Identity and Job Autonomy as Correlates of Burnout among Doctors in Jos.
J. Basic. Appl. Sci. Res., 1(7)644-648, 2011 2010, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com Task Identity and Job Autonomy as Correlates of
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
National Mental Health Survey of Doctors and Medical Students Executive summary
National Mental Health Survey of Doctors and Medical Students Executive summary www.beyondblue.org.au 13 22 4636 October 213 Acknowledgements The National Mental Health Survey of Doctors and Medical Students
THE IMPACT OF CALL CENTRE STRESSORS ON INBOUND AND OUTBOUND CALL-CENTRE AGENT BURNOUT
THE IMPACT OF CALL CENTRE STRESSORS ON INBOUND AND OUTBOUND CALL-CENTRE AGENT BURNOUT INTRODUCTION Many researchers have studied the antecedents of burnout and consider burnout to be predicted by high
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
Office of the Commissioner for Public Employment COUNSELLING. for better work performance
Office of the Commissioner for Public Employment COUNSELLING for better work performance Northern Territory Government Contents Introduction Performance Management Page 1 Feedback Page 4 Moving from feedback
NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE
1. Scope and Purpose NEWMAN UNIVERSITY DISCIPLINARY POLICY AND PROCEDURE 1.1 Newman University [hereafter referred to as the University] recognises disciplinary rules and procedures are necessary for the
Health and Safety Policy
Health and Safety Policy October 2014 1 October 2014 Contents: Introduction 1. STATEMENT OF INTENT AND POLICY OBJECTIVES 2. RESPONSIBILITIES AND ACCOUNTABILITIES FOR HEALTH AND SAFETY 2.1 The Director
TAFE SA Student Alcohol and Other Drug Policy Under the umbrella of Drugs and Alcohol Policy (DFEEST OHS&IM 026)
TAFE SA Student Alcohol and Other Drug Policy Under the umbrella of Drugs and Alcohol Policy (DFEEST OHS&IM 026) 1. Purpose of the policy The purpose of the Student Alcohol and Other Drug Policy is to
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
Our Vision Optimising sustainable psychological health and emotional wellbeing for young people.
Our Mission To provide free psychological services to young people and their families. Our Vision Optimising sustainable psychological health and emotional wellbeing for young people. 1 Helping Students,
DATA AND PAYMENT SECURITY PART 1
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY
London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY Date of implementation: 01/11/05 Issue No:01 Issued by: Stephen Moore Executive approval: 12/09/2005 INTRODUCTION 1. This document sets
Task Identity and Job Autonomy as Correlates of Burnout among Nurses in Jos, Nigeria
International Review of Social Sciences and Humanities Vol. 2, No. 1, October (2011), pp. 7-13 www.irssh.com ISSN 2248-9010 (Online), ISSN 2250-0715 (Print) Task Identity and Job Autonomy as Correlates
Business Case. for an. Information Security Awareness Program
Business Case (BS.ISAP.01) 1 (9) Business Case for an Information Security Business Case (BS.ISAP.01) 2 Contents 1. Background 3 2. Purpose of This Paper 3 3. Business Impact 3 4. The Importance of Security
Employee Engagement A Brief Review of Definitions, Theoretical Perspectives and Measures
Employee Engagement A Brief Review of Definitions, Theoretical Perspectives and Measures Lul Admasachew Jeremy Dawson Aston Business School, Aston University 1. Literature Review Perspectives on Engagement
De Positieve Psychologie van Arbeid en Gezondheid
De Positieve Psychologie van Arbeid en Gezondheid Prof. dr. Arnold Bakker www.arnoldbakker.com Symposium Alles Goed? 3 februari 2011 PART 1 The Concept Positive Organizational Behavior The study and application
Cyber security in the workplace: Understanding and promoting behaviour change
Cyber security in the workplace: Understanding and promoting behaviour change John M Blythe PaCT Lab, Department of Psychology, Northumbria University, Newcastle-upon-Tyne, UK NE1 8ST [email protected]
Chun-mei Hu 1, Shu-jing Cui 1, Lei Wang 1
Journal of Education and Training Studies Vol. 4, No. 9; September 2016 ISSN 2324-805X E-ISSN 2324-8068 Published by Redfame Publishing URL: http://jets.redfame.com Path Analysis of Work Family Conflict,
Student Name: Kumar Dangi Student ID: S264185. Master of Information Technology (Software Engineering)
A comparative study and analysis between the PP model and Current Security Compliance models A comparative study and analysis between the PP model and Current Security Compliance models Student Name: Kumar
Risk Management Policy
Risk Management Policy Responsible Officer Author Ben Bennett, Business Planning & Resources Director Julian Lewis, Governance Manager Date effective from December 2008 Date last amended December 2012
NHS WALES. Local Health Boards DISCIPLINARY PROCEDURE AND RULES
NHS WALES Local Health Boards DISCIPLINARY PROCEDURE AND RULES 1. POLICY STATEMENT 1.1 It is the policy of Local Health Boards to promote good employment relations between them and their staff. Consequently
STRESS POLICY. Stress Policy. Head of Valuation Services. Review History
STRESS POLICY Title Who should use this Author Stress Policy All Staff SAC Approved by Management Team Approved by Joint Board Reviewer Head of Valuation Services Review Date 2018 REVIEW NO. DETAILS Review
Information Security Incident Management Policy and Procedure
Information Security Incident Management Policy and Procedure Version Final 1.0 Document Control Organisation Title Author Filename Owner Subject Protective Marking North Dorset District Council IT Infrastructure
Managing the Risk of Work-related Violence and Aggression in Healthcare
Managing the Risk of Work-related Violence and Aggression in Healthcare Information Sheet November, 2014 The purpose of this information sheet is to provide information and guidance on managing the risk
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Dual Diagnosis Dr. Ian Paylor Senior Lecturer in Applied Social Science Lancaster University
Dual Diagnosis Dr. Ian Paylor Senior Lecturer in Applied Social Science Lancaster University Dual diagnosis has become a critical issue for both drug and mental health services. The complexity of problems
INTRODUCTION TO INDUSTRIAL ORGANIZTIONAL PSYCHOLOGY
SUBJECT INTRODUCTION TO INDUSTRIAL ORGANIZTIONAL PSYCHOLOGY SESSION 1 INTRODUCTION TO INDUSTRIAL ORGANIZATIONAL PSYCHOLOGY Subject: Introduction Industrial Organizational Psychology Session 1 What Is Industrial
Physical Security Policy Template
Physical Security Policy Template The Free iq Physical Security Policy Generic Template has been designed as a preformatted framework to enable your Practice to produce a Policy that is specific to your
THE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
DISCIPLINARY POLICY AND PROCEDURE
DISCIPLINARY POLICY AND PROCEDURE Content Policy statement 1. Principles 2. Standards 3. Disciplinary procedure 4. Investigation
THE PSYCHOLOGICAL SOCIETY OF IRELAND
W&OP Acc criteria May 09 THE PSYCHOLOGICAL SOCIETY OF IRELAND CUMANN SÍCEOLAITHE ÉIREANN GUIDELINES FOR THE ACCREDITATION OF POSTGRADUATE ACADEMIC COURSES IN WORK AND ORGANISATIONAL PSYCHOLOGY DATE: MAY
Appendix A MF&RA Critical Incident Stress Management (CISM) Implementation Plan
Appendix A MF&RA Critical Incident Stress Management (CISM) Implementation Plan 1. Introduction Merseyside Fire and Rescue Authority (MF&RA) have a responsibility to ensure as far as reasonably practicable,
Job Description. Employment Officer
Job Description 5/30/2005 Page 1 PURPOSE OF THE POSITION (The main reason for the position, in what context and what is the overall end result) The is responsible for providing career and employment counseling
Doctor of Clinical Psychology
Doctor of Clinical Psychology Programme of study for the degree of Doctor of Clinical Psychology 1. The following may be accepted as a candidate for the degree of Doctor of Clinical Psychology: Graduates
THE PSYCHOLOGICAL SOCIETY OF IRELAND CRITERIA FOR THE ACCREDITATION OF ACADEMIC POSTGRADUATE COURSES IN FORENSIC PSYCHOLOGY
THE PSYCHOLOGICAL SOCIETY OF IRELAND CRITERIA FOR THE ACCREDITATION OF ACADEMIC POSTGRADUATE COURSES IN FORENSIC PSYCHOLOGY May 2007 1 PSI Accreditation Guidelines for Academic Postgraduate Courses in
SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY
SHAMING AS A TECHNIQUE FOR INFORMATION SECURITY POLICY AND TRAINING ADHERENCE Mark A. Harris University of South Carolina [email protected] ABSTRACT Information security policy and information security
Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015
Category Human Resources Document Name Disciplinary Policy Accountable Body RADIUS Trust Reference HR.P2 Date Ratified 13 th August 2015 Version 1.5 Last Update August 2015 Related Documents Name Support
PPC Worldwide Manager Resource
PPC Worldwide Manager Resource Guide Act as if what you do makes a difference. It does. William James (1842-1910 American Philosopher) Take control of the Employee Assistance Program in your workplace.
School of Rehabilitation Therapy Occupational Therapy Program Physical Therapy Program
Professional Behaviour Policy 1.0 Introduction School of Rehabilitation Therapy Occupational Therapy Program Physical Therapy Program The purpose of this document is to provide occupational therapy and
Disciplinary and Grievance Policy
United Biscuits UK Ltd Disciplinary and Grievance Policy June 2015 Contents 1. Introduction... 3 2. Disciplinary Policy... 3 2.1. Aims of Policy... 3 2.2. Responsibilities... 3 2.3. Legal Framework within
Canada Sets a New Psychological Health & Safety Standard
Canada Sets a New Psychological Health & Safety Standard History was made earlier this year when Canada launched a new National Standard for Psychological Health & Safety in the workplace. A first of its
Plan Sponsor s Guide to the HIPAA Security Rule
Plan Sponsor s Guide to the HIPAA Security Rule Compliments of Aetna 00.02.117.1 (8/04) The HIPAA Security Rule We live in a world with ever increasing Internet and e-mail access, networking capabilities,
Non-Malicious Security Violations
Non-Malicious Security Violations Carl D. Willis-Ford Senior Technical Advisor II, SRA International, Inc. Senior Member, ISSA Doctoral Candidate, Capitol College Speaker Background 9 years U.S. Navy,
The psychosocial health of police personnel
The psychosocial health of police personnel I. van Beek, MSc (UtrechtUniversity) Prof. dr. T.W. Taris (Utrecht University) Prof. dr. W.B. Schaufeli (Utrecht University) Summary of I. Van Beek, T.W. Taris
DISCIPLINARY PROCEDURE
DISCIPLINARY PROCEDURE INTRODUCTION These procedures are compliant with the ACAS code of practice and are designed to help and encourage staff at Pilgrims Hospice to achieve and maintain required standards
MEDICINA y SEGURIDAD del trabajo
Editorial Senior Specialist on Occupational Health. Programme on Health Promotion and Well-being. International Labour Office. Correspondencia Specialist on Occupational Health Programme on Health Promotion
HEALTH & SAFETY POLICY
HEALTH & SAFETY POLICY 1. STATEMENT OF INTENT & POLICY OBJECTIVES The Council, as the governing body of the School, recognises and accepts the responsibilities placed on it as 'Employer' by the Health
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
. Board Charter - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1. Interpretation 1.1 In this Charter: Act means the Companies
Seven Simple steps. For Mobile Device Management (MDM) 1. Why MDM? Series
Series Seven Simple steps For Mobile Device Management (MDM) Mobile device management (MDM) has become a necessity across the globe due to the ever expanding and developing world of technology; Technavio
The Missing Link: Supervisors Role in Employee Health Management. Insights from the Shepell fgi Research Group
The Missing Link: Supervisors Role in Employee Health Management Insights from the Shepell fgi Research Group The Missing Link: Supervisors Role in Employee Health Management Introduction During difficult
Employees have the right to appeal against any disciplinary warnings and dismissal.
ST JUST IN PENWITH TOWN COUNCIL DISCIPLINARY PROCEDURES Introduction This procedure is designed to help and encourage all employees to achieve and maintain acceptable standards of conduct and job performance.
COURSE APPROVAL GUIDELINES APS COLLEGE OF ORGANISATIONAL PSYCHOLOGISTS
COURSE APPROVAL GUIDELINES APS COLLEGE OF ORGANISATIONAL PSYCHOLOGISTS Updated January 2007 1. General Introduction and Principles These Guidelines have been developed for use by tertiary institutions
Local Disciplinary Policy
DOCUMENT INFORMATION Origination/author: Judith Coslett, Head of Human Resources This document replaces: Local Disciplinary and Dismissal Procedure 05 Date/detail of consultation: Staff Forum and Unison
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Disciplinary Policy and Procedure
Disciplinary Policy and Procedure Policy 1. Purpose of the policy and procedure Disciplinary rules are important for the running of the University so that everyone understands what is expected of them
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS
PRINCIPLES OF CORPORATE GOVERNANCE FOR SUPERVISED INSTITUTIONS Content of principles I. ORGANISATION AND ORGANISATIONAL STRUCTURE 1. 1 The organisation of a supervised institution should enable meeting
Disciplinary procedure
Disciplinary procedure At Dandelion Education we follow our legal obligations as an employer at all times including dealing with any disciplinary matter in a fair and consistent manner. We have a policy
Risk Management Policy and Framework
Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email [email protected] location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871
Title: Sickness Absence Management Policy and Procedure. CONTENT SECTION DESCRIPTION PAGE. 1 Introduction 2. 2 Policy statement 2.
Title: Sickness Absence Management Policy and Procedure. Date Approved: 17 June 2014 Approved by: JSPF Date of review: June 2016 Policy Ref: Issue: 1 Division/Department: Human Resources Author (post-holder):
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve
EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY Inspire and Achieve Introduction This document sets out the guidance on social networking and aims to: Set clear expectations of behaviour
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
Advisory Guidelines of the Financial Supervisory Authority. Requirements regarding the arrangement of operational risk management
Advisory Guidelines of the Financial Supervisory Authority Requirements regarding the arrangement of operational risk management These Advisory Guidelines have established by resolution no. 63 of the Management
Diagnosis communication and patients coping strategies. Dawn Langdon PhD
Diagnosis communication and patients coping strategies Dawn Langdon PhD Patient focused quality interventions To improve health literacy To improve clinical decision making To improve self-care To improve
1. INTRODUCTION... 1 2. SCOPE... 1 3. ROLES AND RESPONSIBILITIES... 2 4. REPRESENTATION... 3 5. INVESTIGATIONS... 3 6. SUSPENSION...
The Skinners School Staff Disciplinary (Misconduct) Policy CONTENTS PAGE NO 1. INTRODUCTION... 1 2. SCOPE... 1 3. ROLES AND RESPONSIBILITIES... 2 4. REPRESENTATION... 3 5. INVESTIGATIONS... 3 6. SUSPENSION...
South Australia Police POSITION INFORMATION DOCUMENT
South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
OECD GUIDELINES FOR PENSION FUND GOVERNANCE
OECD GUIDELINES FOR PENSION FUND GOVERNANCE These Guidelines were approved by the Working Party on Private Pensions on 5 June 2009. OECD GUIDELINES FOR PENSION FUND GOVERNANCE 1 I. GOVERNANCE STRUCTURE
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities. A Graphic Representation
Journeys through the Criminal Justice System for Suspects, Accused and Offenders with Learning Disabilities A Graphic Representation 0 Contents Introduction page 2 Methodology page 4 Stage One Getting
Violence against staff
Violence against staff Introduction NHS staff should be able to come to work without fear of violence, abuse or harassment from patients or their relatives. In most cases, patients and their relatives
STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS
Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level
Customizing Careers. The impact of a customized career
Customizing Careers The impact of a customized career Introduction The long-predicted talent gap is upon us. While many of today s business leaders typify the traditional workforce, the vast majority of
Disciplinary Procedure
Disciplinary Procedure Human Resources 1 Introduction The University is committed to supporting its staff in carrying out their responsibilities within an environment which encourages productive, safe
Disciplinary and Performance Management Policy & Procedure October 2010
Disciplinary and Performance Management Policy & Procedure October 2010 Policy control Reference Disciplinary & Performance Management Policy & Procedure Date approved 18 October 2010 Approving Bodies
EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS IN INFORMATION SYSTEMS ORGANIZATIONS
SENRA Academic Publishers, British Columbia Vol. 8, No. 3, pp. 3125-3129, October 2014 Online ISSN: 1920-3853; Print ISSN: 1715-9997 EFFECTIVENESS OF DETECTIVE AND PREVENTATIVE INFORMATION SECURITY CONTROLS
Lifestreams Christian Church (LCC) Child Care Centre. Educator/Staff Performance Management Policy
Lifestreams Christian Church (LCC) Child Care Centre Educator/Staff Performance Management Policy Policy Number: /2013 Rationale and Policy Considerations The education and care service understands that
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
PRSSO305A Manage conflict through negotiation
PRSSO305A Unit descriptor Employability skills Application of the unit Manage conflict through negotiation This unit of competency specifies the outcomes required to use effective communication techniques
Wiltshire Council Human Resources. Improving Work Performance Policy and Procedure
Wiltshire Council Human Resources Improving Work Performance Policy and Procedure This policy can be made available in other languages and formats such as large print and audio on request. What is it?
Investigation Report: The Hong Kong Police Force. Leaked Internal Documents Containing Personal Data. via Foxy
Published under Section 48(2) of the Personal Data (Privacy) Ordinance (Cap. 486) Investigation Report: The Hong Kong Police Force Leaked Internal Documents Containing Personal Data via Foxy (English translation)
